SlideShare a Scribd company logo
  • Upload
  • Login
  • Download free for 30 days
SlideShare a Scribd company logo
  • Upload
  • Download free for 30 days
  • Login
×
×
×
×
×
×
UltraUploader

UltraUploader

6 Followers
185 SlideShares 6 Followers
  • Unblock User Block User
185 SlideShares 6 Followers

  • Activity
  • About

Presentations

(14)
See all

A survey of cryptologic issues in computer virology

10 years ago • 140 Views

Analysis of web application worms and viruses

10 years ago • 390 Views

Anti virus product evaluation in the real world

10 years ago • 179 Views

Antivirus update reaction times of major antivirus vendors

10 years ago • 234 Views

Api win32 ancestrales pour chevaux de troie hyper furtifs

10 years ago • 212 Views

Applications of immune system computing

10 years ago • 251 Views

Attack of the quantum worms

10 years ago • 177 Views

Autoimmune computer virus

10 years ago • 221 Views

Autoimmune viruses

10 years ago • 140 Views

Automated defense from rootkit attacks

10 years ago • 270 Views

Automatic comparison of malware

10 years ago • 267 Views

Backdoors et rootkits_avancees_[slides]

10 years ago • 451 Views

Botnetsand applications

10 years ago • 245 Views

[Ebook ita - security] introduzione alle tecniche di exploit - mori - ifoa - 2003

10 years ago • 489 Views

Documents

(171)
See all

$$$ +$$+$$ _+_$+$$_$+$$$_+$$_$

10 years ago • 111 Views

64 bit rugrats

10 years ago • 165 Views

A bit of viral protection is worth a megabyte of cure

10 years ago • 206 Views

A bypass of cohen's impossibility result

10 years ago • 145 Views

A classification of viruses through recursion theorems

10 years ago • 129 Views

A comprehensive program for preventing and detecting computer viruses is needed

10 years ago • 139 Views

A computational model of computer virus propagation

10 years ago • 107 Views

A cost analysis of typical computer viruses and defenses

10 years ago • 163 Views

A cooperative immunization system for an untrusting internet

10 years ago • 114 Views

A critical look at the regulation of computer viruses

10 years ago • 326 Views

A distributed approach against computer viruses inspired by the immune system

10 years ago • 103 Views

A dozen dangerous myths about computer viruses

10 years ago • 94 Views

A failure to learn from the past

10 years ago • 217 Views

A fast static analysis approach to detect exploit code inside network flows

10 years ago • 186 Views

A fault tolerance approach to computer viruses

10 years ago • 140 Views

A feature selection and evaluation scheme for computer virus detection

10 years ago • 179 Views

A filter that prevents the spread of mail attachment-type trojan horse computer worms

10 years ago • 117 Views

A formal definition of computer worms and some related results

10 years ago • 265 Views

A framework for deception

10 years ago • 660 Views

A framework for modelling trojans and computer virus infection

10 years ago • 186 Views

A framework to detect novel computer viruses via system calls

10 years ago • 139 Views

A general definition of malware

10 years ago • 199 Views

A generic virus detection agent on the internet

10 years ago • 285 Views

A generic virus scanner in c++

10 years ago • 183 Views

A history of computer viruses introduction

10 years ago • 242 Views

A history of computer viruses the famous `trio'

10 years ago • 197 Views

A history of computer viruses three special viruses

10 years ago • 165 Views

A hybrid model to detect malicious executables

10 years ago • 117 Views

A hygiene lesson

10 years ago • 49 Views

A mathematical theory for the spread of computer viruses

10 years ago • 301 Views

Modal header

  • About
  • Support
  • Terms
  • Privacy
  • Copyright
  • Cookie Preferences
  • Do not sell or share my personal information
English
Current Language: English
Español
Português
Français
Deutsch

© 2025 SlideShare from Scribd